1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
3 years ago
15

Which of the following is necessary for opening email attachments under most circumstances? The correct RAM The correct drivers

The correct software The correct certificates
Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
4 0

Answer:

The Correct Software

Explanation:

Some mail application have built in support to view the attachment like in a phone. While others don't, so if that is the case your device will attempt to open the file according to its extension (.exe, .txt, .js etc.) If your device doesn't have the correct software to open it, then the other things don't matter.

You might be interested in
What special skill does a developer need to thelp produce timely solutions for users
Gnom [1K]
All we need is Faith, Trust, and Pixie Dust...
4 0
3 years ago
What is meant ny backing up files through cloud computing
vitfil [10]

The cloud is a network of computer linked by the internet to store information. Backing up file using cloud computing means that your files will be put on the cloud as an extra copy in case you lose them or such. The cloud will still have a copy to use.

6 0
3 years ago
Read 2 more answers
explain the joke, “There are 10 types of people in the world: those who understand binary and those who don’t.”
tino4ka555 [31]

Answer:

Binary is made up of only 2 digits: a one and a zero. 1011 is eleven in our counting system.

So 10 in binary = 2 in our counting system.

Read the joke as follows. There are 2 types of people in the world: those who  understand binary and those who do not.

I guess it's not really that funny, but computer programmers like it.

6 0
1 year ago
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
Blake is on the fast track and hopes to get a promotion soon. he wants to make sure that he is always able to
sergiy2304 [10]

Answer:

D

Explanation:

7 0
2 years ago
Other questions:
  • write an algorithm that gets the price for item A plus the quantity purchased. The algorithm prints the total cost, including a
    5·1 answer
  • Namespaces cannot have namespaces as members.<br><br> True<br><br> False
    7·1 answer
  • Allison, a very close friend of yours, is about to give a presentation to the class. You know that she has procrastinated and is
    14·2 answers
  • 1. Write a recursive method to determine if a character is in a list of characters in O(logN) time. Mathematically prove (as we
    13·1 answer
  • True or False: Assuming that all variables are defined, the following segment of code is invalid. if ( x &gt; 0 )
    10·1 answer
  • When a CPU executes each instruction in a program, it uses a process known as the __________.
    15·1 answer
  • Images are available in many formats, such as tif, bmp, gif, jpeg, and ____.
    5·1 answer
  • 4. True or False: In order to use wi-fi signal/network, you have to remain seated in one spot.
    6·1 answer
  • Places where computer are used​
    11·2 answers
  • 8. Give regular expressions with alphabet {a, b} for
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!